Wednesday, July 31, 2019

Cybersecurity for Critical Infrastructure Protection Essay

Cybersecurity entails safeguarding of computer networks and the information that it carries from unauthorized access and malicious disruption or damage. This is because the use of networks has become common in businesses and government activities, and any tampering can cause serious consequences for the affected bodies. A question is what degree do the security bridge has to critical infrastructure. Analyses of unconventional and asymmetric attacks assume that potential opponents would use cyber weapons. Such opponents could employ the use of conventional nation state and â€Å"non-state actors† opponents. Initially, cyber weapons were considered better because of their asymmetric attacks because of the low cost, which results in damaging most vulnerable parts that are found in most of the computer networks – may be disastrous as kinetic or blast weapon. â€Å"Digital Pearl Harbor† a term that appeared in mid-1990s, when internet was commercialized and frequently used came to birth. The scenario in this picture is that the world would plunge into disaster due to the introduction of hackers. Some of the results that were predicted to be associated with the Digital Pearl Harbor include open floodgates, blackness, poison water supply and planes crashing. However, there is no cyber attack that has produced such disastrous results. Such talk arose due to lack of technological understanding, how software’s operate, and the operation of other complex system. To determine the extent of risk that is posed by computer networks and its vulnerabilities, it requires an estimation of probability that will damage critical infrastructure in certain ways that will affect the national interest. Hence, it means that there should be sequential or simultaneous events that must occur for a digital attack in the cyberspace to have physical effect. Computer networks are usually the vulnerable part, and not the critical infrastructure that these networks accommodate or support. Infrastructures are strong and resilient and are capable of absorbing damages that are associated to terrorism, natural disasters and climates. This means that the issue of cybersecurity in the field of terrorism is usually overestimated. By saying so, it does not mean that planning of critical infrastructure protection should not be in place. In planning for the measures that should be include in planning in the CIP, first as the computer networks increase, their vulnerabilities also increases. Secondly, another method that can be employed by the attackers is attacking the storage parts of the networks instead of the networks itself. The networks are penetrated, collect-required information and monitor changes without creating any suspicion and when they are suspected, the databases and networks that support important activities are disrupted. Political Context for Cyber security and CIP In the end of 1990s, cybersecurity policies were dominant and there were frequent discussions on the issue of critical infrastructure protection. Nevertheless, currently there is a minimal understanding by the Federal that the initial issues that were associated with the use of internet and network connectivity were overemphasized. This overemphasis was due to several factors that range from the introduction of Internet to the Y2K (Philemon 2005, pp. 70). Y2K was associated for previous programming errors which IT experts believed that world would plunge into chaos at the mid night of the New Year, thus brought most attention to the world of cyber security. American government as been associated with risk-averse policies since the 1970s. This is because there is a loss in terms of confidence of governing elites, decrease in public trust and a punitive and partisan political environment. Hence introduces plans, policies, and various strategies for critical infrastructure protection. This political change brings in better understanding of cybersecurity and critical infrastructure protection. Hence, planning for critical infrastructure protection requires an assessment of risks that are capable of damaging attack. An individual who is risk aversive may estimate the probability of damage attack to be higher when compared to a neutral individual (Davis 2003, pp. 33). Assessing Risks In determination of the significance of cybersecurity for critical infrastructure protection, it must begin with estimating the risk. This method so far has proved difficult to incorporate. The better method is neutrally analyzing previous attacks and gain better ways of knowing it causes and consequences that were associated. This will enable the estimation of likelihood that a potential attacker will concentrate on a particular target. In addition, it is able to predict the type of weapons that will be used. This involves understanding the motive of the attacker, strategic role, capabilities, preferences, goals and experience. This will weigh the capabilities and goals of the attacker against potential infrastructure vulnerabilities (Davis 2003, pp. 33 – 34). The definition of risk is how much of threats that a society or government could withstand and relies on the importance of the security. Homeland Security policy states that it is difficult to eliminate all risks, but requires priorities that will reduce the amount of risks that are associated with cybersecurity. Risks that are associated to cybersecurity can be grouped into three parts: risks that can cause injuries or death, affects the economy or reduce the capability of military. So far, there are no issues or threats that are associated with the different groups (Keith 2005, pp. 66). Critical Infrastructures and Computer Networks United States has a long list that identifies critical sectors and includes agriculture, health systems, banking and fiance, IT and telecommunication, energy, industries, and transportation. To the Federal government the issue of cybersecurity is not serious to them. An infrastructure is said to be critical since it is able to meet some standards of national interest. To meet these different standards, there is usually an implicit assumption that disruption of the infrastructure would reduce flow of services and goods creating hardship resulting to impeding of government economic operations. To understand the relation between cybersecurity contributions to the critical infrastructure protection, two additional concepts of location and time can be introduced (Keith 2005, pp. 66). Location and time helps in understanding that cybersecurity is not a concern to critical infrastructure. Those issues that takes time to show problems, usually gives time for the affected organization to identify solutions and organize and in marshaling resources to respond to the issue, hence, does not present a crisis. The capability of industries to respond to the problems through innovation and creating alternative technologies or solutions means that those infrastructures that had disruption and did not posses immediate danger, results in minimal effect to the economic, national security and life in general. National infrastructures are geographical distributed which means that they are not critical in nature. This means that larger infrastructure provides critical supports to key governmental functions and economic, and not the entire industries or networks. This means that there are few networks that are national in nature and at the same time are usually mutually dependent. Networks that are associated with telecommunications, finance and electrical power are most critical because of its interconnectedness, economic health and national scope. An example is the Fed wire that supports banking, if it is attached it may cripple the banking sector form sometime, but the Federal Reserve have developed means to harden the Fed Wire. Internet as a Critical Infrastructure With the help of cyber weapons, the Internet can to some point be attacked. However, the Internet is a shared network that if attacked will affected both the target and the attacker. An attacker can calculate that the US economy may be most affected and the attacker may use back ups of some sort, giving it a temporary advantage. Internet is robust and is able to operate even if the Soviet Union and United States exchange nuclear weapons. Its architecture and design enables it to survive and withstand all these problems. With packet switching, the Internet can redirect the messages and at the end of the day arrives or are directed to the required port. The capacities of the internet to operate is due to the addressing system which is multilayered, decentralized and has the possibility of operating even if it means it will take days to update the routing table. The core protocols that are employed by the internet are vulnerable to attack. An example is the Border Gateway Protocol –BGP that is responsible for routing traffic, has been tested and it is vulnerable to attacks but the attacker has to face the redundancy, which is associated with thousand of subsidiary networks in the Internet (Davis 2003 pp. 33 – 34). So far, there is only one case that has between witnessed, in 2002 there was an attack to the Distributed Denial of Service of eight out of the 13 important root servers, which govern the addresses of the Internet. The attack did not cause a lot disruption but it is believed that if it could have taken a longer time it would have degenerated the Internet. Since the 2002 incident the DNS system has been strengthened through dispersing the root servers to different places, using new software’s and employing routing techniques. Hence, the new redundancy that has been employed has drastically reduced the issue of shutting down the DNS. In addition, the complexity that is associated with estimating the actual cost makes planning for critical infrastructure protection difficult. Most estimates that are associated with cybersecurity are exaggerated or overestimated. To obtain the amount of damages that are caused by cybersecurity, a sample is estimated and then it is extrapolated to the affected population. Analysis of the impacts and effects of cybersecurity estimates should be analyzed by statistical analyses and economic losses should not be received in face value. Importance of the cybersecurity in protecting critical infrastructures other than electrical power, telecommunications or finance, rests on the believe that the critical infrastructures are dependent on the computer networks for them to be able to operate. In such perspective the computer network specifically are vulnerable but the infrastructure that they support are not vulnerable (Philemon 2005, pp. 70 – 75). An example of a distractive cyber attack was the Slammer worm. It effects affected automated teller machines (ATM) across the northwest making 13000 to be out of service. Many analysts belief that the Slammer was a damaging cyber attack, but in national perspective, it had small impact since other parts of the country operated normally. Furthermore, the Slammer Worm only affected one bank and its ATM services. In this case, the customers of the bank suffered some inconveniences; the bank lost revenue and spoilt their reputation giving an advantage to the cybersecurity conscious competitors. Potential opponents in terms of nation-states may employ the use of cyberspace. When they gathering intelligence information will prompt them to attack and penetrate the U. S. computer networks. When a conflict occurs between different states, information, skills and access to crucial infrastructure will be used to disrupt important information system. Risks that are associated with espionage and cyber crime are real for firms, agencies and individuals. References Davis, J. (2003). Information Technology Security Threats, New York: Barron’s Educational Series, pp. 30 – 34 Keith, J. (2005), Plans and Developments in Computer Networking, New Haven: Yale University Press, pp. 66 Macklin, M. (2007), Computer networking Implementation and Security, Jakarta: Cambridge University Press, pp. 45 – 49 Peter, K. (2001). Cyber Security and CIP, Australia: Fontana Books, pp. 120 – 121 Philemon, M. (2005), Development of Computer Systems and Terrorism Threats, Stanford: Stanford University Press, pp. 70 – 75 Rachael, L. (2003), Critical Infrastructure Protection, New York: New York Publishers, pp. 13 16 Richard, Z. (2005), Management and Information Technology, London: Oxford University Press, pp. 60 – 61

Tuesday, July 30, 2019

University of Madras

nrd;idg; gy;fiyf;fofk;; UNIVERSITY OF MADRAS (Established under the Act of Incorporation XXVII of 1857 – Madras University Act 1923) B. Sc. / B. C. A. DEGREE [CHOICE BASED CREDIT SYSTEM] EXAMINATIONS November 2012 (State University) TIME-TABLE [For candidates admitted to the Course of Study from the Academic Year 2008-2009] Time: FN – 10. 00 am to 01. 00 pm AN – 02. 00 pm to 05. 00 pm Max: 75 Marks DATE & SESSION SUBJECTS SUBJECT CODEFOUNDATION COURSES PART – I – LANGUAGES – FIRST SEMESTER Tamil – I CLA1A Telugu – I CLB1A Kannanda – I CLC1A Malayalam – I CLD1A Hindi – I CLE1A 15-11-2012 FN Urdu – I CLF1A Sanskrit – I CLG1A Arabic – I CLH1A Arabic – I (Candidate admitted from 2012-13) CLH1E French – I CLK1A French – I (Candidate admitted from 2012-13) CLK1E SECOND SEMESTER Tamil – II CLA2B Tamil – II (Candidate admitted from 2010-2011) Telugu – II Kannanda – II 15-11-2012 AN Malayalam – II Hindi – II Urdu – II Sanskrit – II Arabic – II French – II THIRD SEMESTER Tamil – III Telugu – III Kannanda – III Malayalam – III 10-11-2012 FN Hindi – III Urdu – III Sanskrit – III Arabic – III French – III FOURTH SEMESTER Tamil – IV Telugu – IV Kannanda – IV Malayalam – IV 10-11-2012 AN Hindi – IV Urdu – IV Sanskrit – IV Arabic – IV French – IV CLA2G CLB2B CLC2B CLD2B CLE2B CLF2B CLG2B CLH2B CLK2B CLA3C CLB3C CLC3C CLD3C CLE3C CLF3C CLG3C CLH3C CLK3C CLA4D CLB4D CLC4D CLD4D CLE4D CLF4D CLG4D CLH4D CLK4D 2 FOUNDATION COURSES PART – II – ENGLISH -FIRST SEMESTER English – I (For candidates admitted in 2008-2009 Batch) CLZ1A English – I (From 2009-2010 Batch – for BCA/B. Sc. 17-11-2012 FN CLZ1E Electronics and communication science Br. ) English – I (From 2009-2010 Batch – for B. Sc. & B. A. Candidates) CLZ1H SECOND SEMESTER English – II CLZ2B English – II (From 2009-2010 Batch- for BCA / B. Sc.CLZ2G 17-11-2012 AN Electronics and communication science Br. ) English – II (From 2009-2010 Batch- for B. A. /B. Sc. All CLZ2J Branches except Electronics and communication Science) THIRD SEMESTER 14-11-2012 FN English – III CLZ3C FOURTH SEMESTER 14-11-2012 AN English – IV CLZ4D FOURTH SEMESTERSPECIAL SUBJECT – COMMON TO ALL BRANCHES 16-11-2012 AN Environmental Studies ENV4A CORE COURSE-MAIN SUBJECTS [TAD] ADVANCED ZOOLOGY AND BIOTECHNOLOGY – FIRST SEMESTER (Candidate admitted from 2012-2013 Batch onwards) 20-11-2012 FN 20-11-2012 FN Paper – I Invertebrate Paper – I Invertebrate TAD1A TAE1A [TAE] ZOOLOGY – FIRST SEMESTER (Candidate admitted from 2012-2013 onwards) SAA] ADVANCED ZOOLOGY AND BIOTECHNOLOGY & [SAW] ZOOLOGY FIRST SEMESTER 20-11 -2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 FN 06-11-2012 FN 06-11-2012 AN 07-11-2012 FN 07-11-2012 AN 08-11-2012 FN 08-11-2012 AN Paper – I Invertebrate-I SECOND SEMESTER Paper – II Invertebrate-II THIRD SEMESTER Paper-IV Chordata-I FOURTH SEMESTER Paper- V Chordata-II FIFTH SEMESTER Paper-VII- Cell Biology Paper-VIII- Genetics Paper-IX – Animal Physiology Paper – X – Bio Statistics & Computer Applications SIXTH SEMESTER Paper-XI Environmental Biology & Evolution Paper-XII Developmental Biology & Immunology Paper-XIII Biotechnology & Microbiology Bio Statistics & Computer Applications ELECTIVIES – I/II/III Bio-Informatics Computer Application in Life Science Medical Lab Technique and Bio instrumentation Pisciculture and Aquarium Fish Keeping Sericulture and Apiculture Economic Entomology and Pest Management SAA4A SAA5A SAA5B S AA5C SAA5D/ SAA6D SAA6A SAA6B SAA6C SAA6D/ SAA5D SEAAA SEAAB SEAAC SEAAD SEAAE SEAAG SAA3A SAA2B SAA1A 3 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 03-11-2012 FN SAB] BIOCHEMISTRY – FIRST SEMESTER Paper – I Cell Biology SECOND SEMESTER Paper – II Chemistry of Biomolecules THIRD SEMESTER Paper IV: Biochemical Techniques–I FOURTH SEMESTER Paper- V Biochemical Techniques–II FIFTH SEMESTER Paper VII: Enzymes Paper VIII- Intermediary Metabolism Paper IX: Molecular Biology Elective- I Biotechnology SIXTH SEMESTER Paper X –Nutritional Biochemistry & Human Rights Pa per XI – Clinical Bio Chemistry ELECTIVES Elective – II – Immunology Elective – III – Physiology [SAC] BIOTECHNOLOGY – FIRST SEMESTER Paper – I Cell Biology SECOND SEMESTER Paper – III Molecular Developmental Biology THIRD SEMESTER Paper-V – Genetics FOURTH SEMESTER Paper- VII- Plant Biotechnology FIFTH SEMESTER Paper- IX – Animal and Medical Biotechnology Paper- X – Bioinformatics Paper-XI-Immunology Elective –I Pharmaceutical Biotechnology SIXTH SEMESTER Paper XIII – Genetic Engineering Paper XIV – Bioprocess Technology ELECTIVES Elective – II Microbial Biotechnology Elective – III Environmental Biotechnology [SAD] CHEMISTRY – FIRST SEMESTER Paper – I General Chemistry I SECOND SEMESTER Paper – III General Chemistry II THIRD SEMESTER Paper – V – General Chemistry III FOURTH SEMESTER Paper- V Inorganic Chemistry – I FIFTH SEMESTER Paper –VII-Inorganic Chemistry II Paper – VIII- Organic Chemistry I Paper – IX–Physical Chemistry I (Prior to 2010-11) Paper – IX–Physical Chemistry I (Candidate admitted from 2010-2011) SAB1A SAB2B SAB3A SAB4A SAB5A SAB5B SAB5C SEB5A SAB6A SAB6B SEB6A SEB6B SAC1A SAC2B SAC3A SAC4A SAC5A SAC5B SAC5C SEC5A SAC6A SAC6B SEC6A SEC6B SAD1A SAD2B SAD3A SAD4A SAD5A SAD5B SAD5C SAD5D SIXTH SEMESTER Paper – XII Organic Chemistry – II SAD6A Paper – XIII Physical Chemistry –II SAD6B Paper – XIV Analytical Chemistry SAD6C ELECTIVES – I/ II/ III Material and Nano Chemistry SEDAA Industrial Chemistry SEDAB Pharmaceutical Chemistry SEDAC Applied Electrochemistry SEDAD Leather Chemistry SEDAE Polymer Electrochemistry SEDAG [SAE] COMPUTER SCIENCE – FIRST SEMESTER Programming in C SAE1A SECOND SEMESTER Digital Electronics and Microprocessors SAE2B THIRD SEMESTER Paper–V-Programming in C++ and Data Struc tures SAE3A / SAZ3A FOURTH SEMESTER Paper- VII – Programming in Java SAE4A / SAZ4A FIFTH SEMESTER Paper – IX Operating systems SAE5A Paper -X-Database Management Systems SAE5B / SAZ5A Paper – XI – Computer Architecture and SAE5C Organization ELECTIVIES – I Visual Programming SEE5A / SEZ5A/ SEU6C RDBMS with ORACLE SEE5B / SEZ5B Unix Programming SEE5C / SEZ5C SIXTH SEMESTER SAE6A/ Paper – XIII Data Communication & Networking SAZ6B/ SEU6D SAE6B/SAZ6A Paper – XIV Web Technology ELECTIVIES – II 06-11-2012 AN 05-11-2012 AN Data Mining Object Oriented Analysis and Design Software Testing ELECTIVIES – III 24-11-2012 AN 07-11-2012 AN 20-11-2012 FN 20-11-2012 AN 07-11-2012 FN 08-11-2012 FN 09-11-2012 FN 07-11-2012 AN 08-11-2012 AN 09-11-2012 AN Client Server Computing Computer Graphics Software Engineering Paper-I Electricity And Basic Electronics SECOND SEMESTER Paper-II Electromangetism and AC Circuits THIRD SEMESTER Paper-IV Se miconductor Physics Paper–V Numerical Methods Paper – VI – Amplifiers and Oscillators FOURTH SEMESTER Paper-VII – Semiconductor Devices and Integrated Circuits Paper–VIII-Programming in C Paper –IX – Digital Electronics SEE6D/ SEZ6E/ SEU6E SEE6E SEE6G SAG1A SAG2B SAG3A SAG3B SAG3C SAG4A SAG4B SAG4C SEE6A/SEZ6A SEE6C/SEZ6C SEE6B/ SAZ6C/ SEU6G 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 FN 05-11-2012 AN 06-11-2012 FN 06-11-2012 AN 07-11-2012 AN 08-11-2012 AN 20-11-2012 AN 21-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 22-11-2012 FN 05-11-2012 FN 01-11-2012 AN 02-11-2012 AN [SAG] ELECTRONICS AND COMMUNICATION SCIENCE – FIRST SEMESTER FIFTH SEMESTER 01-11-2012 FN Paper –XI- Microprocessor (Intel 8085) SAG5A 02-11-2012 FN Paper – XII-Antennas and Wave Propagation SAG5B 03-11-2012 FN Paper XIII–Communication Electronics SAG5C ELECTIVIES – I Medical Electronics SEG5A Industrial Electronics SEG5B 05-11-2012 FN Power Electronics SEG5C Computer Networks SEG5D SIXTH SEMESTER 01-11-2012 AN Paper XV – Microprocessor Interfacing (Intel 8085) SAG6A 02-11-2012 AN Paper XVI – Television and Video Engineering SAG6B 03-11-2012 AN Paper XVII – Opto – Electronics SAG6C Paper XVIII – Electrical & Electronics 05-11-2012 AN SAG6D Instrumentation [SAH] HOTEL & CATERING MANAGEMENT – FIRST SEMESTER 15-11-2012 FN Paper – I French – I SAH1A 17-11-2012 FN Paper – II English – I SAH1B 20-11-2012 FN Paper-III Food Production-I SAH1C 21-11-2012 FN Paper – IV Food & Beverage Service – I SAH1D 22-11-2012 FN Paper – V Front Office Operation-I SAH1E 23-11-2012 FN Paper-VI Nutrition & Food Science-I (Max. 35 Marks) SBH1A 15-11-2012 AN 17-11-2012 AN 20-11-2012 AN 21-11-2012 AN 22-11-2012 AN 23-11-2012 AN SECOND SEMESTER Paper – VII French – II Paper – VIII Engl ish – II Paper–IX Food Production– II Paper – X Food & Beverage Service – II Paper–XI Accomodation Operation – I Paper XII–Nutrition and Food Science II (Max. 35 Marks) SAH2G SAH2H SAH2J SAH2K SBH2B SBH2C 6-11-2012 FN 07-11-2012 FN 08-11-2012 FN 24-11-2012 FN 09-11-2012 FN 19-11-2012 FN 10-11-2012 FN 14-11-2012 FN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 10-11-2012 AN 14-11-2012 AN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN THIRD SEMESTER Food Production – III Food and Beverage Service – III Hotel Engineering and Maintenance (Max. 35 Marks) Principles of Management (Max. 35 Marks) Hotel Accounting System (Max. 35 Marks) Food and Beverage Management (Max. 35 Marks) FIFTH SEMESTER Food Production – IV Food & Beverage Service – IV Front Office Operation- II Marketing and Sales Management (Max. 35 Marks) Hotel Law (Max. 35 Marks) Hotel Financial Management (Max. 5 Marks) SIXTH SEMESTER Food Production Facility Planning (Max. 35 Marks) Accommodation Operation – II Human Rights and Human Relations Education (Max. 35 Marks) Application of Computer (Max. 35 Marks) SAH3A SAH3B SBH3A SBH3B SBH3C SBH3D SAH5A SAH5B SAH5C SAH5D SAH5E SAH5G SAH6A SAH6B SAH6C SAH6D SAH6E [TAJ] HOME SCIENCE EMERING TECHNOLOGY – CLINICAL NUTRITION AND DIETETICS – FIRST SEMESTER 20-11-2012 FN Paper – I Food Science SAJ1A 21-11-2012 FN Paper – II Human Physiology SAJ1B [SAJ] CLINICAL NUTRITION AND DIETETICS – FIRST SEMESTER SECOND SEMESTER 20-11-2012 AN Paper – III Basic Nutrition SAJ2C 21-11-2012 AN Paper – IV Family Meal Management SAJ2D/ SAL4A THIRD SEMESTER 09-11-2012 FN 09-11-2012 AN 19-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 06-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN Paper– V-Microbiology of Sanitation and Hygiene FOURTH SEMESTER Paper–VII Personnel Management Paperâ€⠀œVIII Nutritional Biochemistry FIFTH SEMESTER Paper IX – Human Development Paper – X – Advanced Dietetics Paper XI- Quantity Food Production Paper XII – Clinical Nutrition Elective I – Principles of Interior Design SIXTH SEMESTER Paper – XIII Food Service Equipment and Layout Paper XIV – Community Nutrition Paper – XV Management of Resources ELECTIVES – II/III Electives – II Entrepreneurship Development SAJ3A SAJ4A SAJ4B SAJ5A/SAK5A/ SAL5A SAJ5B SAJ5C / SAL5C SAJ5D SEJ5A / SEL5A SAJ6A/SAL6A SAJ6B/SAL6B SAJ6C/SAL6C SEJ6A SEJ6B/SEK6B/ 06-11-2012 AN Electives – III Family Studies SEL6B [TAK] HOME SCIENCE EMERING TECHNOLOGY – INTERIOR DESIGN AND DECOR – FIRST SEMESTER 20-11-2012 FN Principles of Interior Decoration – I SAK1A 21-11-2012 FN Principles of Interior Decoration – II SAK1B [SAK] INTERIOR DESIGN AND DECOR – FIRST SEMESTER SECOND SEMESTER 20-11-2012 AN Principles of I nterior Design- I SAK2C 21-11-2012 AN Principles of Interior Design-II SAK2D THIRD SEMESTER 09-11-2012 FN Paper -V – Applied art on textiles – I SAK3APaper–VI-Interior Design and Applied arts (Minor 19-11-2012 FN SAK3B Arts ) FOURTH SEMESTER Paper-VII – Interior Design and Applied arts 09-11-2012 AN SAK4A (Major Arts ) 19-11-2012 AN Paper–VIII- Applied art on textiles – II SAK4B FIFTH SEMESTER SAK5A/SAJ5A/ 01-11-2012 FN Paper – IX -Human Development SAL5A 02-11-2012 FN Paper – X – Textiles and Clothing I SAK5B Paper XI – Fine Arts, Drawing, Sculpture and 03-11-2012 FN SAK5C Painting SAK5D 05-11-2012 FN Paper XII-Fundamentals of Foods and Nutrition SEK5A 06-11-2012 FN Elective I – Mass Communication SIXTH SEMESTER SAK6A 01-11-2012 AN Paper – XIII – Textiles and Clothing II Paper – XIV – Fine Arts, Drawing, Sculpture and SAK6B 02-11-2012 AN Painting SAK6C 03-11-2012 AN Paper XV â⠂¬â€œ Principles of Resource Management ELECTIVES II/III SEK6A 05-11-2012 AN Electives – II Communication and Graphic Design SEK6B/SEJ6B/ 06-11-2012 AN Electives – III Family Studies SEL6B [TAL] HOME SCIENCE EMERGING TECHNOLOGY NUTRITION, FOOD SERVICE MANAGEMENT AND DIETETICS FIRST SEMESTER 20-11-2012 FN Paper – I Food Science SAJ1A 21-11-2012 FN Paper – II Human Physiology SAJ1B [SAL] NUTRITION, FOOD SERVICE MANAGEMENT AND DIETETICS SECOND SEMESTER 19-11-2012 AN Paper – III Microbiology SAL2A 20-11-2012 AN Paper – IV House Keeping SAL2B THIRD SEMESTER 09-11-2012 FN Paper – V- Biochemistry SAL3A FOURTH SEMESTER 21-11-2012 AN Paper –VII Family Meal Management SAL4A / SAJ2D 09-11-2012 AN Paper – VIII Human Nutrition SAL4B FIFTH SEMESTER 01-11-2012 FN Paper – IX – Human Development SAL5A /SAK5A / SAJ5A 02-11-2012 FN Paper – X – Dietetics SAL5B 03-11-2012 FN Paper XI – Quantity Food Product ion SAL5C / SAJ5C SAL5D 05-11-2012 FN Paper XII- Fundamentals of Textiles and Clothing SEL5A / SEJ5A 06-11-2012 FN Elective I – Principles of Interior Design SIXTH SEMESTER Paper – XIII Food Service Equipment and Layout SAL6A/ SAJ6A 01-11-2012 AN SAL6B/ SAJ6B 02-11-2012 AN Paper – XIV Community Nutrition SAL6C/SAJ6C 03-11-2012 AN Paper – XV Management of Resources SEL6A 05-11-2012 AN Electives-II Clothing Construction SEL6B / SEK6B / SEJ6B 06-11-2012 AN Electives – III Family Studies [SAM] MATHEMATICS – FIRST SEMESTER 21-11-2012 FN 22-11-2012 FN 21-11-2012 AN 22-11-2012 AN 19-11-2012 FN 20-11-2012 FN Paper – I Algebra And Trigonometry-I Paper – II Calculus And Co-Ordinate Geometry of 2 Dimensions SECOND SEMESTER SAM1A/TAB1A SAM1B/TAB1B SAM2C/TAB2A SAM2D/TAB2B SAM3A/TAB3A SAM3B/TAB3B Paper – III Algebra and Trigonometry-II Paper –IV Calculusand Differential Geomentry THIRD SEMESTER Paper –V Differential equa tions and Laplace transforms Paper – VI Coordinate geometry of 3 dimensions and probability FOURTH SEMESTER 9-11-2012 AN 20-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 06-11-2012 FN 07-11-2012 FN 08-11-2012 FN 24-11-2012 FN 05-11-2012 AN 06-11-2012 AN 07-11-2012 AN 08-11-2012 AN 09-11-2012 AN 09-11-2012 AN 09-11-2012 FN Paper –VII Vector Calculus, Fourier Series and Fourier Transforms Paper – VIII Statics FIFTH SEMESTER SAM4A SAM4B SAM5A SAM5B SAM5C SAM5D SAM6A SAM6B SAM6C SEMAA SEMAB SEMAC SEMAD SEMAE SEMAG SEMAH SEMAJ SEMAK SEMAM SEMAL Paper –IX Algebraic Structures –I Paper – X – Real Analysis –I Paper –XI – Dynamics Paper –XII -Programming Language ‘C’ SIXTH SEMESTER Paper – XIII Algebraic Structures –II Paper – XIV Real Analysis – II Paper – XV Complex Analysis ELECTIVIES – I/II/IIIOp erations Research-I Graph Theory-I Special Functions-I Astronomy-I Operation Research II Graphy Theory II Special Functions II Astronomy II Discrete Mathematics Discrete Mathematics (Candidate admitted from 2012-2013) Elementary Number Theory 8 [SAN] MICROBIOLOGY –FIRST SEMESTER 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN `02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 06-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 06-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN 06-11-2012 AN Paper – I General Microbiology SECOND SEMESTERSAN1A SAN2B SAN3A SAN4A SAN5A SAN5B SAN5C SEN5A SAN6A SAN6B SEN6A SEN6B SAR1A SAR2B/TAC2A SAR3A Paper – III Immunology & Microbial Genetics THIRD SEMESTER Paper V – Molecular Biology FOURTH SEMESTER Paper VII – Soil and Agricultural Microbiology FIFTH SEMESTER Paper IX – Medical Bacteriology Paper X – Medical Mycology and Parasitology Paper XI – Medical Virology Elective – I -Genetic Engineering SIXTH SEMESTER Paper – XIII – Environmental Microbiology Paper – XIV – Food and Diary Microbiology Electives – II Industrial and Pharmaceutical Microbiology Electives – III Biotechnology [SAR] PHYSICS -FIRST SEMESTER Paper – I Mechanics And Properties of Matter SECOND SEMESTER Paper – II Thermal Physics & AccousticsTHIRD SEMESTER Paper – IV Optics FOURTH SEMESTER Paper –V – Atomic Physics FIFTH SEMESTER SAR4A SAR5A SAR5B SAR5C SAR5D SER5A SAR6A SAR6B SER6A SER6B SAS1A SAS2B SAS3A SAS4A SAS5A SAS5B SAS5C SAS5D SES5A SAS6A SAS6B SAS6C SES6A SES6B Paper VII Electricity and Elect romagnetism Paper VIII Nuclear Physics and Particle Physics Paper – IX – Solid State Physics Paper – X – Basic Electronics Electives – I Numerical Methods SIXTH SEMESTER Paper XI Relativity and Quantum Mechanics Paper – XII Mathematical Methods in Physics Electives – II Integrated Electronics Electives – III Microprocessor Fundamentals Paper–I Plant Diversity– I Phycology SECOND SEMESTER SAS] PLANT BIOLOGY AND PLANT BIOTECHNOLOGY – FIRST SEMESTER Plant Diversity – II Mycology, Virology, Bacteria and Lichens THIRD SEMESTER Paper- IV – Bryophytes and Pteridophytes FOURTH SEMESTER Paper –V – Gymnosperms and Paleobotany FIFTH SEMESTER Paper VII – Plant Morphology and Taxonomy Paper- VIII – Plant Anatomy and Embryology Paper- IX -Environmental science and Phytogeography Paper – X Cell Biology and Molecular Biology Electives – I Horticulture SIXTH SEMESTER P aper – XI Genetics, Plant Breeding, Evolution and Biostatistics Paper – XII – Plant Physiology and Plant Biochemistry Paper – XIII Economic Botany Electives – II Advanced Plant Biotechnology Electives – III Plant pathology [SAT] PSYCHOLOGY – FIRST SEMESTER Paper – I General Psychology – I Paper-II Biological Basis of Behavior-I SECOND SEMESTER Paper – III General Psychology–II Paper-IV Biological Basis of Behavior-II THIRD SEMESTER Paper–V Developmental Psychology – I FOURTH SEMESTER Paper –VII – Developmental Psychology – II FIFTH SEMESTER Paper – IX- Psychopathology – I Paper – X – Psychological Research and Measurement 20-11-2012 FN 21-11-2012 FN 20-11-2012 AN 21-11-2012 AN 09-11-2012 FN 09-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN 05-11-2012 FN 06-11-2012 FN 01-11-2012 AN 02-11-2012 AN 03-11-2012 AN 05-11-2012 AN 06-11-2012 AN 20- 11-2012 FN 20-11-2012 AN 09-11-2012 FN 19-11-2012 FN 23-11-2012 AN 19-11-2012 AN 01-11-2012 FN 02-11-2012 FN 03-11-2012 FN SAT1A SAT1B SAT2C SAT2D SAT3A SAT4A SAT5A SAT5B SAT5C SAT5D SET5A SAT6A SAT6B SAT6C SET6A SET6B SAU1A SAE1A SAU3A SBU3A SAU4A SBU4A SAU5A SAU5B SAU5C SEU5A SEU5B SEU5C SAU6A SAU6BPaper – XI – Applied Psychology Paper–XII- Social Psychology- I Elective – I – Health Psychology SIXTH SEMESTER Paper – XIII Psychopathology – II Paper – XIV Organizational Psychology Paper – XV – Social Psychology – II Electives – II Counselling and Guidance Electives – III Human Resource Management [SAU] SOFTWARE APPLICATIONS – FIRST SEMESTER Fundamentals of Digital Computers SECOND SEMESTER Programming in C THIRD SEMESTER Paper–V Data Structures through C++ Applied Physics- I FOURTH SEMESTER Paper–VII– Microprocessor and its Applications Applied Physics- II FIFTH SEM ESTER Paper – IX : Software Engineering Paper – X : Operating Systems Paper – XI : Programming in JAVA ELECTIVIES – I Computer Oriented Mathematics Software Project Management Object Oriented Analysis and Design SIXTH SEMESTER Paper – XIII: Object Oriented Software Engineering Paper – XIV: Database Management Systems ELECTIVIES – II Multimedia Systems 06-11-2012 FN 7-11-2012 AN 02-11-2012 AN 08-11-2012 AN 06-11-2012 AN 22-11-2012 FN 01-11-2012 AN 24-11-2012 AN 05-11-2012 AN 20-11-2012 FN 21-11-2012 FN 20-11-2012 AN 21-11-2012 AN 09-11-2012 FN 19-11-2012 FN Software Quality and Assurance Visual Programming ELECTIVIES – III Data Communication and Networking SEU6D/ SAZ6B/ SAE6A Client Server Computing SEU6E/ SEE6D/ SEZ6E Software Testing SEU6G/ SEE6B/ SAZ6C [SAY] ELECTRONIC MEDIA – FIRST SEMESTER Paper – I History of Electronic Media SAY1A Paper – II Principles of Audiography SAY1B SECOND SEMESTER Paper â€⠀œ III Communication Skills SAY2C Paper – IV Radio Production SAY2D THIRD SEMESTER Paper– V – Videography SAY3A Paper–VI–Video Editing (Principles and Practices) SAY3B SEU6A/ SEZ6D SEU6B SEU6C / SEE5A / SEZ5A 10FOURTH SEMESTER Paper– VII Elements of Film SAY4A Paper–VIII– Scriptwriting and Direction SAY4B FIFTH SEMESTER 01-11-2012 FN Paper – IX – Television Production Management SAY5A 02-11-2012 FN Paper – X – Media Aesthetics SAY5B 03-11-2012 FN Paper – XI – Graphics and Animation SAY5C SIXTH SEMESTER 01-11-2012 AN Paper – XIII – Media Organization SAY6A 02-11-2012 AN Paper – XIV – Media Culture and Society SAY6B (TAA) – STATISTICS – FIRST SEMESTER 20-11-2012 FN Descriptive Statistics TAA1A 21-11-2012 FN Mathematics for Statistics – I TBA1A SECOND SEMESTER 20-11-2012 AN Probability and Random Variables TAA2A 21-11-2012 AN Mathematics for Statistics – II TBA2A THIRD SEMESTER 09-11-2012 FN Distribution Theory TAA3A 19-11-2012 FN â€Å"C† Language Programming TBA3A (TAB) – MATHEMATICS WITH COMPUTER APPLICATIONS – FIRST SEMESTER 21-11-2012 FN Core – 1 Algebra And Trigonometry – I TAB1A/SAM1A Core – 2 Calculus And Co-Ordinate Geometry of 2 22-11-2012 FN TAB1B/SAM1B Dimensions 24-11-2012 FN Core – 3 Object Oriented Programming – Using C++ TAB1C SECOND SEMESTER 21-11-2012 AN Core – 5 Algebra And Trigonometry – II TAB2A/SAM2C 22-11-2012 AN Core – 6 Calculus and Differential Geometry TAB2B/SAM2D Core – 7 Data Structures TAB2C 23-11-2012 AN 09-11-2012 AN 19-11-2012 AN 19-11-2012 FN 20-11-2012 FN THIRD SEMESTER Differential Equations and Laplace Transforms TAB3A/SAM3A Coordinate Geometry of 3 Dimensions and Probability TAB3B/SAM3B (TAC) – PHYSICS WITH COMPUTER APPLICATIONS – FIRST SEMESTER Core – 1 Mechanics And Pro perties of Matter TAC1A SECOND SEMESTER Core – 2 Thermal Physics & Acoustics TAC2A/SAR2B THIRD SEMESTER Optics TAC3A Basic Electronics TAC3B Data Structures TAC3C/TAB2C Object Oriented Programming Using C++ TAC3D/TAB1C B. C. A. [SAZ] COMPUTER APPLICATIONS FIRST SEMESTER Fundamentals of Digital Computers SAU1A SECOND SEMESTER Programming in C SAE1A THIRD SEMESTER Programming in C++ and Data Structures SAZ3A/ SAE3A Microprocessors and its Applications SAZ3B Numerical and Statistical Methods SAZ3C Financial Accounting (Candidates admitted Prior to 2009SBZ3A 2010) Financial Accounting (Candidates admitted from 2009SBZ3B 2010) Financial Accounting (Candidates admitted from 2010- 2011) SBZ3C FOURTH SEMESTER Programming in Java SAZ4A/SAE4A Operating System SAZ4B Computer Graphics SAZ4C Cost and Management Accounting SBZ4A FIFTH SEMESTER Paper-XIII – Database Management System SAZ5A/SAE5B Paper-XIV – Software Engineering SAZ5B Paper-XV – Resource Management Techn iques SAZ5C 20-11-2012 FN 20-11-2012 AN 09-11-2012 FN 19-11-2012 FN 23-11-2012 AN 24-11-2012 FN 0-11-2012 FN 20-11-2012 AN 09-11-2012 FN 19-11-2012 FN 21-11-2012 FN 23-11-2012 FN 23-11-2012 FN 23-11-2012 FN 09-11-2012 AN 19-11-2012 AN 21-11-2012 AN 23-11-2012 AN 02-11-2012 FN 01-11-2012 FN 03-11-2012 FN 11 ELECTIVES – I Visual Programming RDBMS with ORACLE Unix Programming SIXTH SEMESTER Paper – XVII Web Technology Paper – XVIII – Data Communication and Networking Paper XIX – Software Testing ELECTIVES – II Data Mining E-Commerce Object Oriented Analysis and Design ELECTIVES – III Multimedia Systems Distributed Computing Client Server Computing 22-11-2012 FN 05-11-2012 FN 02-11-2012 AN 01-11-2012 AN 05-11-2012 AN 06-11-2012 AN SEZ5A/ SEE5A/SEU6C SEZ5B/ SEE5B/ SEZ5C/ SEE5C SAZ6A/ SAE6B SAZ6B/ SAE6A/SEU6D SAZ6C/ SEE6B/ SEU6G SEZ6A/SEE6A SEZ6B SEZ6C/ SEE6C 08-11-2012 AN 08-11-2012 AN 24-11-2012 ANSEZ6D/SEU6A SEZ6G SEZ6E /SEE6D/ SEU6E ALL IED SUBJECTS (For All Branches) – FIRST SEMESTER / THIRD SEMESTER Biochemistry – I SBBBA Paper-I – Bio-Chemistry (Applied Biotechnology) SBBBC Paper-I -Biochemistry (For Biotechnology Br. ) SBC3A Paper-I – Biochemistry (For Microbiology Br. ) Paper – III- Basic Computer Application and AUTOCAD – I (For Interior Design and Decor Br) Paper III Basic Computer science and application (For Clinical Nutrition and Dietetics ) Paper–III Basic Computer science and application–I (For Nutrition, Food Service Managt. And Dietetics Branch) Paper–III Statistics in Psychology (For Psychology Branch) Financial Accounting – I (Com. To B. Com-Gen. BM, BBA, BSc & BSc-ISM) Chemistry– I (Other than Mathematics&Physics Br) Chemistry – I (For Mathematics & Physics Br) Chemistry – I [Microbiology Branch] Interior Design Studio and Building System Technology–I Paper– I Calculus of Finite Difference and N umerical Analysis Paper – I Statistical Methods and their Applications – I [For Botany,Computer Science] Paper – I Microbiology – I [For Bio-Technology] Paper – I Microbiology – I [For Biochemistry) Paper – I Zoology (Admitted prior to 2012-13) Paper – I Zoology (Candidate admitted from 2012-13) Paper–I Mathematical Statistics-I [For Mathematics] Paper – I Principles of Sociology (For Psychology Branch) SBN3A SBK3A SBJ3A/ SBL3A SBL3A/ SBJ3A SBT3A SBAMK/BPF1A/ BPZ1A/ BPW1A/ MAM1A SBADA SBADC SBD1E SBK1A SBAME SBAOC SBANA SBANC SBAAA SBAAC SBAOA SBT1A 23-11-2012 FN 26-11-2012 FN 27-11-2012 FN 28-11-2012 FN 29-11-2012 FN 30-11-2012 FN 01-12-2012 FN Cost Accounting (For Mathematics Branch) Mathematics – I [For Computer Science, Software Engg. , & B. C. A] Mathematics – I [Other than Comp. Sci. , Software Engg & B. C.A] Bio-Statistics I [For Zoology, Biochemistry Br. ] Physics – I Basic Physicsâ₠¬â€œI (For B. Sc. Electronics & Communication Science) SBAMR SBAMA SBAMC SBAOH SBARA SBG3A SBASA Botany – I 12 23-11-2012 AN 26-11-2012 AN 27-11-2012 AN ALLIED SUBJECTS (For All Branches) SECOND SEMESTER/FOURTH SEMESTER Paper – II Genetics and Microbiology (Applied SBBBD Biotechnology) Bio-Statistics (For Microbiology Br. ) SBN4A Paper–IV Book Keeping and Cost Accounting SBJ4A Paper – IV – Basic Computer Application and SBK4A AUTOCAD-II Paper– IV – Basic Computer Science and SBL4A Applications- II Paper – IV – Marketing and Consumer Behavior SBT4A Financial Accounting – II(Com. To B. Com-Gen. SBAML/BPZ2A/BPF2A/ Finance) Chemistry – II (Other than Mathematics & Physics SBADB Branch) Chemistry – II(For Mathematics & Physics Br) SBADD Chemistry-II [Microbiology Br. ] SBD2G Chemistry (For Biotechnology) SBADE Interior Design Studio and Building System SBK2B Technology- II Paper – II Calculus of Fi nite Difference and SBAMG Numerical Analysis Paper–II Statistical Methods and their Applications – SBAOD II [For Botany,Computer Science Branch] Paper – II – Biophysics and Biostatistics SBACB (For Biotechnology) Paper – II Microbiology – II [For Biochemistry] SBAND Paper – II Zoology SBAAB SBAOB SBT2B SBAMS SBAMB SBAMD SBAOJ SBARB SBG4A SBASB 28-11-2012 AN 29-11-2012 AN 30-11-2012 AN 01-12-2012 AN Paper-II Mathematical Statistics-II [For Mathematics Br. Paper-II Fundamentals of Social Anthropology (For Psychology Branch) Management Accounting(For Mathematics Branch) Mathematics – II [For Computer Science, Software Appl. ,& B. C. A] Mathematics-II [Other than Comp. Science, Software Appl. & B. C. A] Bio-Statistics – II [For Zoology, Biochemistry Br] Physics – II Basic Physics–II (For B. Sc. Electronics & Communication Science) Paper – II Botany NON EQUIVALENT SUBJECTS 03-12-2012 03-12-2012 04-12-2012 04-12-2012 05-12-2012 05-12-2012 06-12-2012 06-12-2012 07-12-2012 07-12-2012 08-12-2012 08-12-2012 03-12-2012 04-12-2012 08-12-2012 06-12-2012 07-12-2012 08-12-2012 FN AN FN AN FN AN FN AN FN AN FN AN FN FN FN FN FN FNBOTANY Paper–III Cytology and Anatomy Paper-V Microbiology and Plant Pathology Paper–IX Taxonomy and Embryology Paper–X Environmental Biology and Toxicology Paper–XI Plant Physiology and Plant Bio Chemistry Microtechnique Plant Protection Hydrobiology – Freshwater Horticulture Food Microbiology Bio-Technology Plant Cell and Tissue Culture MICROBIOLOGY Paper-II Microbial Physiology Paper – III Immunology Clinical Bacteriology and Mycology Immunotechnology Intellectual Property Rights(IPR) and Bio-Safety Fermentation Technology & Downstearm Processing BA3A BA5A BA6A BA6B BA6C RBAA RBAB RBAC RBAD TEC TEG TEH BB2A BB3A RBBA RBBB RBBC RBBD 13 03-12-2012 04-12-2012 05-12-2012 06-12-2012 FN FN FN FNPLANT BIOLOGY AND PLANT BIOTECHNOLO GY Paper – X Environmental Science & Phytogeography Paper – XI Plant Physiology Modern Plant Pathology Microtechnique ZOOLOGY Paper – XII Evolution Paper – XII Evolution Biology of Fish and Capture Fisheries Principles of Aquaculture Fish Genetics and Diseases ADVANCE ZOOLOGY AND BIO-TECHNOLOGY BC6B BC6C RBCA RBCB 03-12-2012 FN 04-12-2012 FN 05-12-2012 FN 06-12-2012 FN 07-12-2012 FN BD6D BD6J ZBEA ZBEB RBEA 03-12-2012 FN Paper – XII Biochemistry BIO-TECHNOLOGY BJ6D 03-12-2012 FN 08-12-2012 FN 08-12-2012 FN Paper – X Intellectual Property Management Biosafety and Bioethics Immunology and Bio Physics Environmental Bio-Technology and DNA Recombidant Technology BIO-CHEMISTRY BK6C ZBDG RBDL 03-12-2012 FN 05-12-2012 FNEnvironmental Bio-Chemistry Bio-Chyemistry – II Bio Instrumentation CHEMISTRY Paper – IV General Chemistry – IV Applied Chemistry – I Applied Chemistry – II PSYCHOLOGY Paper-IV Applied Social Psycho logy Paper-IV Applied Social Psychology Paper – XI Geriatric Psychology Psychology of Advertising Educational Psychology Rehabilitation Psychology Environmental Psychology Statistical Reasoning in Psychology Environmental Psychology Human Development and Family Studies MATHEMATICS a) The Relational Data Model, Relational Algebra and Calculus b) Elements of System Software NUMERICAL METHODS FOR STATISTICS MAIN PHYSICS Energy Physics Material Science Computer Programming – â€Å"C† Language Molecular Biophysics Spectroscopy and Laser Physics INTERIOR DESIGN AND DECOR RCAA ZCAB ZCAC 03-12-2012 FN 04-12-2012 FN 05-12-2012 FN CB4A RCBA RCBB 03-12-2012 FN 04-12-2012 FN 04-12-2012 AN 05-12-2012 FN 05-12-2012 AN 06-12-2012 FN 06-12-2012 AN 07-12-2012 FN 07-12-2012 AN HG2B HG2D HG5C RHGB KNA/ RGC TWB ZHGB ZHGD ZHGG ZHGH 03-12-2012 FN 04-12-2012 FN TAH TAK ZPAL 03-12-2012 FN 04-12-2012 FN RPBE RPBH RPBD RPBG RPBJ 03-12-2012 FN 04-12-2012 FN Interior Design Studio and Buil ding Systems Techonology-I Interior Design Studio and Building Systems Technology-II SOFTWARE ENGINEERING ZRTA ZRTB 03-12-2012 FN Data Structures PE4B 14ELECTRONICS AND COMMUNICATION SCIENCE 03-12-2012 FN 04-12-2012 FN 05-12-2012 FN 06-12-2012 FN 07-12-2012 FN Paper – III Physics of Materials Paper – XII Data Processing and Personal Computers Mathematical Physics Basic Physics Nuclear Electronics NUTRITION, FOOD SERVICE MANAGEMENT AND DIETETICS 03-12-2012 FN 04-12-2012 FN 06-12-2012 FN Consumer Education Paper-II Sanitation & Hygiene Paper-IV Advanced Cookery NAUTICAL SCIENCE 01-11-2012 FN 01-11-2012 AN 02-11-2012 FN 02-11-2012 AN 03-11-2012 FN 03-11-2012 AN 05-11-2012 FN 05-11-2012 AN 06-11-2012 FN 06-11-2012 AN 07-11-2012 FN 07-11-2012 AN 08-11-2012 FN 08-11-2012 AN 09-11-2012 FN 09-11-2012 AN 19-11-2012 FN 19-11-2012 AN 20-11-2012 FN 20-11-2012 AN 21-11-2012 FN Paper-I Nautical Mathematics-I Paper-II Nautical Physics and Electronics-I (Prior to 2004-05) Paper-II Nau tical Physics and Electronics-I (From 2004-05) Paper-III Navigation-I (Prior to 2004-05) Paper-III Navigation-I (From 2004-05)(70 Marks) Paper-IV Voyage Planning & Collision Prevention-I (Prior to 2004-05) Paper-IV Voyage Planning & Collision Prevention-I Paper – V Nautical Mathematics – II Paper – VI Nautical Physics and Electronics – II (Prior to 2004-05) Paper – VI Nautical Physics and Electronics–II (From 2004-05) Paper – VII Ship Operation Technology – I (Prior to 2004-05) Paper – VII Ship Operation Technology–I (From 2004-05) (60 Marks) Paper – VIII Naval Architecture – I Paper-IX Marine Engineer-ing & Control Systems-I (Prior to 2004-05) Paper-IX Marine Engineering & Control Systems-I (From 2004-05) Paper – X Navigation – II (Prior to 2004-05) Paper – X Navigation – II (From 2004-05) 70 Marks) Paper- XI Voyage Planning & Collision Prevention–II (Prior to 2004 -05) Paper- XI Voyage Planning & Collision Prevention – II Paper – XII Ship Operation Technology – II (Prior to 2004-05) Paper – XII Ship Operation Technology-II Computer Programming Paper – XIII Naval Architecture – II Paper – XIV Marine Engineering & Control Systems-II Paper – XIV Marine Engineering & Control Systems-II Paper – XV Navigation-III Paper – XV Navigation-III Paper – XVI Voyage Planning & Collision Prevention–III Paper – XVI Voyage Planning & Collision Prevention–III Maritime Law Paper – XVII Bridge Procedures & Legal Knowledge Paper – XVII Bridge Procedures & Legal Knowledge Paper – XVIII Naval Architecture – III Paper – XIX Marine Engineering & Control Systems-III Paper – XIX Marine Engineering & Control Systems-III 21-11-2012 AN Paper – XX Cargo Work & Marine Communication Paper – XX Cargo Work & Marine Communicati on 22-11-2012 FN Marine Management and Maritime Commerce NU1A NU1B NU1C NU2A NU2C NU2B NU2D NU3A NU3B NU3E NU3C NU3G NU3D NU4A NU4E NU4B NU4G NU4C NU4H NU4D NU4J NU4K NU5A NU5B NU5E NU5C NU5G NU5D NU5H RNUA NU6A NU6E NU6B NU6C NU6G NU6D NU6H RNUB RRNC RN1C RN2B PJ3A PJ5D AXA AXB OXC 15STATISTICS 01-11-2012 FN 01-11-2012 AN 02-11-2012 FN 02-11-2012 AN 03-11-2012 FN 03-11-2012 AN 05-11-2012 FN 05-11-2012 AN 06-11-2012 FN 06-11-2012 AN 07-11-2012 FN 07-11-2012 AN 08-11-2012 FN 08-11-2012 09-11-2012 09-11-2012 06-12-2012 19-11-2012 20-11-2012 20-11-2012 05-12-2012 05-12-2012 22-11-2012 05-12-2012 04-12-2012 03-12-2012 04-12-2012 04-12-2012 08-12-2012 03-12-2012 03-12-2012 04-12-2012 04-12-2012 AN FN AN FN AN FN AN FN AN FN AN FN AN FN AN FN FN AN FN AN Paper-I Descriptive Statistics Paper-II Probability and Distributions-I Paper – III Probability and Distributions – II Paper – IV Statistical Inference – I Paper – V Statistical Inference – II Pap er – VI Design of Experiments Paper – VII Time Series, Index Numbers, and Official Statistics Paper – VIII Programming In C++ Demography and Actuarial Statistics Paper – IX Sampling Techniques Paper – X Statistical Quality Control Paper – XI Operations Research Paper – XII Regression Analysis and its Applications Paper – XII Financial Accounting Stochastic Processes and their Applications Genetical Psychological & Educational StatisticsPaper VII Elective I – MS Access and Visual Basic Statistical Methods and their Applications – I Statistical Methods and their Applications – II Bio – Statistics I Bio – Statistics II Mathematical Statistics – I Mathematical Statistics – II Mathematics for Statistics – II Mathematics for Statistics – II Computers and Bio-Statistics Programming in â€Å"C† for Statistics Main Computer Oriented Statistical Methods Mathematics for Statistics–I Financial Accounting-I Financial Accounting-II Cost and Management Accounting-I Cost and Management Accounting-II Costing & Banking COMPUTER SCIENCE 03-12-2012 FN 04-12-2012 FN 05-12-2012 FN PG1A PG2A PG3A PG4A PG5A PG5B PG5C PG5D RPGA PG6A PG6B PG6C PG6D PG6E RPGB NBN CBJ ZPGA ZPGB ZPGC ZPGD ZPGH ZPGJ ZPGL ZPGM ZCAE ZPCG ZPCM ZPGK ZPAJ ZPAK ZPAM/SDER ZPAN/SDES KJA Mass Communication and Media Digital Photography and Videography Digital Video Production PC2B PC4B PC6E B. C. A. DEGREE EXAMINATIONS BACHELOR OF COMPUTER APPLICATIONS 03-12-2012 FN 04-12-2012 FN Programming In Cobol Data Structures and Algorithms PK3A PK4C University Centenary Building, Chepauk, Chennai-600 005. November 2012 Dr. T. LEO ALEXANDER,M. Sc. , M. S. (Canada), Ph. D. CONTROLLER OF EXAMINATIONS

Monday, July 29, 2019

Transcendentalism in Walden by Henry David Thoreau Research Paper

Transcendentalism in Walden by Henry David Thoreau - Research Paper Example â€Å"What everybody echoes or in silence passes by as true to-day may turn out to be falsehood to-morrow, mere smoke of opinion, which some had trusted for a cloud that would sprinkle fertilizing rain on their fields† (Thoreau, 7). One of the basic princiAdvices may be given by adults to the youths however there is not much of credibility in them for their advice to be taken with such significance. People have different fates and experiences and no 2 different people will have the same circumstances brought up to them. Another principle of transcendentalism is that genuine change is derived from within the person himself and not from others’ influence and it is not to please these people but to please the self. A change is not constituted by outside influence but more on taking in consideration a person’s thought on what the change would do for him rather than if it would please others.The author also did not exclude the word I in the context. Rather Thoreau use d the 1st person way of speaking rather than using the 3rd person which is usually being used by writers in voicing out the writer’s opinions and beliefs. The author contradicts the customary way of writing as he states:In most books, the I, or first person, is omitted; in this it will be retained; that, in respect to egotism, is the main difference. We commonly do not remember that it is, after all, always the first person speaking. I should not talk so much about myself if there were anybody else whom I knew as well.

Sunday, July 28, 2019

Paraphrasing Essay Example | Topics and Well Written Essays - 250 words - 26

Paraphrasing - Essay Example Additionally, the experiment will use Wheatstone bridge networks and two resistors, the photo-call and the potentiometer. This experiment seeks to offer lab experience with USB-1208FS DAQ in resistor network analysis. To achieve this, the experiment will rely on Wheatstone bridge networks and two resistors, the photo-call and the potentiometer. Consequently, the DAQ, photo-call, resistors, and the potentiometer construct two circuits that apply in this experiment. A resistor connected in series with Oscilloscope and a photo-resistor defines the initial circuit. In this circuit, users measures voltage using the Oscilloscope and disregard the DAQ and the laptop. A Wheatstone bridge circuit consisting of a photo-resistor and a potentiometer defines the second circuit. The DAQ measures voltage in this circuit. The experiment achieves its purpose by using a photo-resistor and a potentiometer to construct the circuit and using DAQ to measure

Saturday, July 27, 2019

Are Mergers the most appropriate method of strategic growth in todays Essay

Are Mergers the most appropriate method of strategic growth in todays business environment - Essay Example This will be followed by an explanation of key terms namely: mergers, acquisitions, alliances and joint ventures. The main body of the paper will identify the issues and challenges of external methods of strategic growth as well as well as to attempt to establish how these relate to today’s business environment. According to BusinessDictionary (2013), strategic growth is growth aimed at winning larger market share even at the expense of short term earnings. There are four broad growth strategies namely product development, diversification, market penetration and product development. Campbell, Gaule & Morrison (2005) also suggest that â€Å"growth in profits can come from improving the profitability of the existing revenue stream, expanding existing businesses by gaining market share or extending into new markets or products, or entering one or more new businesses by acquisition, joint venture or greenfield investment.† On the other hand, Liabotis (2007) posits to the ef fect that growth strategy can be achieved through growing the core business, growing by sub-segmenting the customers as well as growing adjustment opportunities. As a point of departure, it is imperative to explain the meaning of key terms highlighted above. Weinberg and Blank (1979) â€Å"define merger as an arrangement whereby the assets of two companies become vested in or under the control of one company,† (as cited in Marimuthu, 2008, p. 8). On the other hand, an acquisition can be defined as any transaction where a buyer acquires the assets of the other company and eventually takes control of them (Scharf,1971 as cited in Marimuthu, 2008). A joint venture is a strategic alliance where two or more people or companies agree to contribute goods, services and or capital to a common commercial enterprise (Cook, 2010). The main advantage of joint ventures is related to access and sharing of resources among the partners which can also contribute to the joint ventures profitabi lity. However, this paper will specifically focus on mergers and acquisitions and their contribution to strategic business growth during the contemporary period. There are different reasons why mergers are carried out by different companies. The merging companies will be seeking to increase their market share since they may be joining operations with successful companies in the market. The other reason is that the merged companies may be seeking to gain the skills and expertise of the other employees from the other company as they will cross the floor when a major has taken place. Growth can be achieved through product development, diversification, market penetration or market development (Kotler, 2003). Ansoff suggests that the growth strategy of a company mainly depends on two variables, whether it is the desire to develop new products or new customers as shown in appendix 1. More customers for a specific product can contribute to an increase in the company’s market share. The major aim of various businesses is to attract customers who form the foundation of the organization. In order to attract new customers, there may also be need for developing the products so that they can appeal to a large number of the targeted customers. Product expansion is mainly concerned with keeping the same market of customers while at the same time trying to increase sales through offering more products (Kotler, 2004). This can be achieved through identification of the changes in the customers’

Personal Training in Chad Evermore ompany Case Study

Personal Training in Chad Evermore ompany - Case Study Example These activities will make sure that there are stronger bones, long drive and more power. Cardiovascular evaluation such as step test and walk test should also be considered. Another important factor to consider in order to produce exemplary good performance is to create and stick to the training program. The latter should include some repetitions and exercises; specific needs that would help grow and maintain quality standards in terms of performance of the body and on the field. In addition, the creation of a periodized training program in weekly basis is important such as the one below: Nutrition is the basic or key to any fitness success. This therefore clearly tells us how important it is to uphold excellent nutrition by taking care of what the client takes into the body as food. There are some basic nutritional strategies and more so, food supplements that have been considered in the recent years to boost immune and general body health. This includes 3 meals a day and 2 smaller snacks in between. Multivitamin and fish oil is advantageous too (Walter & Meir,  2003).

Friday, July 26, 2019

Cloud Computing Research Paper Example | Topics and Well Written Essays - 1500 words

Cloud Computing - Research Paper Example This paper presents a detailed overview of cloud computing. This paper also discusses the benefits offered by this modern technology. Cloud Computing The trend of cloud computing is rapidly growing. Cloud computing methodology is vastly ubiquitous in this technological period. However we can define cloud computing technology as an idea or a trend. In this scenario, cloud computing is a useful technique for accessing various applications with storage capacity from a distant location via internet link. Thus it is not an advance standard approach. On the other hand, the cloud computing is an ideal solution for the management and provision of applications, information and data as a service. Additionally, these services are provided over the internet, often on a consumption-based model. In this way we can say that cloud computing  is a technological aspect that is used in main servers and internet to sustain information as well as programs. Usually it is known as a  grid of computersà ‚  that are useful for serves like a service oriented structural design. Hence this design is used for delivering software along with information. Moreover cloud computing facilitates its users and business related modules to make use of applications without paying any cost. Therefore users may access their private data and information through computers, which have internet connection. Cloud computing technological aspects facilitate us through well-organized and resourceful computing with centralizing memory allocation, storage space, bandwidth and processing (Cleveland, S, & Lewis, 2011; TechTarget, 2007; Hartig, 2009). Cloud computing brings a lot of opportunities and solutions for business related problems in organizational matters and for individuals. In this scenario, a straightforward example that fits best to cloud computing is of email servers such as Gmail, Yahoo mail and Hotmail etc. We use these applications without installing any additional hardware, software or any ser ver on our personal computer. Hence the concept of installing any hardware or software (that might be of any sort) is eliminated. In this scenario, users only need to have an internet link and they can start sending or receiving e-mails. The approach behind the central server and email management application is on the internet (cloud). The user makes use of it alone or in community and benefit from its aspects. However cloud computing is broken down into 3 important components. These are following: 1. Infrastructure 2. Applications 3. Platforms In this scenario, each component/segment carries out a different job furthermore offers versatile application for individuals and business purpose round the globe (Cleveland, S, & Lewis, 2011; TechTarget, 2007; Hartig, 2009). Information and storage recovery are important features offered by the computers. In addition, we can simply accumulate our private information like that most wanted songs and children photographs or download movies on t hem. Thus these utilities are widely adopted and used in broader terms. In this scenario, Flicker is a well known name, which is a major example of cloud computing. Flicker allows us to access our videos, important data or images. It does not rely on our location (location is not a matter) and kind of tool we are using. Thus while uploading the essential material we can easily access them from our laptop, personal machine or from I-phone handset (Nations, 2011). Second aspect that is

Thursday, July 25, 2019

Don Delillos novel White noise Essay Example | Topics and Well Written Essays - 1250 words

Don Delillos novel White noise - Essay Example That is an ominous concern for Jack about his relationship with his loved wife Babette. The description the author uses for Jack's thought process on this question tells us how deeply he is in love with Babette. This love being so strong that it flares a selfish desire to rather have himself die first, rather than the other. His desire to be with and love Babbette is greater than the fear of his own death. "This question comes up from time to time, like where are the car keys. It ends a sentence, prolongs a glance between us. I wonder if the thought itself is part of the nature of physical love, or a reverse Darwinism that awards sadness and fear to the survivor."2 This thought is a selfish death desire, because Jack would rather Babbette to be left alone rather than himself if she were to die first. Of course Delillo makes certain the "white noise" plays its part and penetrates through everything by comparing the fleeting thought to missing car keys. At most times the characters are unconscious of the realities of life and death. But when inspected upon, uncomfortable consciousness of death develops like when you pay attention to the constant blinking of your own eye. The hum of the "white noise" has an anesthetic effect on the thoughts of death which is made possible by its power over the truth. Power and authority can be seen in the noise by Chapter six. The authority of the "white noise" is held on the highest pedestal by Heinrich the genius fourteen year old. "It's going to rain tonight." "It's raining now," I said. "The radio said tonight."3 The unquestioned power of the "white noise" can be seen again in chapter eight, as the character Steffie refuses to challenge its authority. "We have to boil our water," Steffie said. "Why" "It said on the radio." "They're always saying boil your water," Babette said.4 Not all the characters are wholly blinded by the white noise as we can tell from the rationalization from Jack and Babette both. "Just because it's on the radio doesn't meant we have to suspend beliefs in the evidence of our senses."5 The noise appears to take more control over the younger generations. The author described the difference in health and behaviors of people in the town broken down by age groups. One thing stimulated by the noise is the advertising of consumables in the supermarket. This is related to death in the obesity and other health complications over eating can cause. The family is aware that Babette purchases food from the supermarket only to never eat it. Even though she goes unconvinced of other aspects of the "white noise" just like Jack. In the area of purchasing groceries she is a knowing yet unhappily submissive to the authority of the noise, feeling guilty all through her relation ship with food. "She feels guilty if she doesn't buy it, she feels guilty when she sees it in the fridge, she feels guilty when she throws it away."6 The supermarket in particular is a hot bed of "white noise" life. I must use the word "life" to describe the "white noise" because Delillo hinted at the noise being a

Wednesday, July 24, 2019

How Setting Goals Lead to Success Essay Example | Topics and Well Written Essays - 1000 words - 19

How Setting Goals Lead to Success - Essay Example Goal setting is one of the most likely natural things that we do as humans.   We tend to move from one region to the other with goals.   The challenge is that most people fail to harness the power of it fully.   Therefore, I learned that there is a magic in setting goals.   More specifically, a written down goals is essential towards my success as the writing clarifies my thoughts.   It helps in committing towards something that I am passionate about, be it in the short term or the long run.   Therefore, a well-written goal instils the inspiration on how to move forward having the goal in mind (Rouillard, 2010).Goals give a direction in all areas of success, be it in personal life or career. It gives a purpose to carry on with a particular task. Working on a well-set goal gives hope and determination to succeed in all activities. Without goals, it is rather difficult to focus and to have a direction in a particular task. Therefore, goal setting provides a benchmark for de termining whether one is succeeding or not. A well-set goal is a secret to success. As the saying goes, â€Å"a goal well set is halfway accomplished† (Rouillard, 2010). Setting goals is the foremost and the most important step towards any achievement in life. The action level, as well as the action itself, stands as the catalyst to turn a particular goal, which is inert, into something that is dynamic. Therefore, to realize the objectives, it is recommendable to know how to set the goals. It is not a matter of merely saying, â€Å"I want it, â€Å" and it happens all of a sudden. Goal setting starts with a careful consideration of what should be achieved and ends with hard work in the process of obtaining it. At the intermediate, there are rules that one has to embrace to make the set goals a success (Rouillard, 2010). The rules noted as follows. At the foremost, it is important to set a goal that motives a person. It is substantial that the set goal is valuable to the set ter, and similarly, there should be an interest in the outcome. It is important to set goals that relate to the high priorities in life. Without such focus, it is possible to end up with too many goals leaving less time to devote to each objective. Hence, goal achievement needs a commitment to maximizing the likelihood of success.

Tuesday, July 23, 2019

English Lesson Plan For Pupils Of The Third Grade Essay

English Lesson Plan For Pupils Of The Third Grade - Essay Example STANDARDS: In this lesson, the students learn to meet standards of English expression by using prepositional phrases, as well as comparing nation and nationality, by producing short autobiographical stories. This concept is central to understanding nation vs. nationality (â€Å"S/he is French; S/he is from France†) generally and can aid students in their use of essays. THEME: The theme of the lesson is the presentation of autobiography. The location of the narrator in context to the city, state, and nation are consistently referred to in the lesson, in terms of locating these objects through using prepositions and appropriate descriptors (â€Å"London is a city; France is a country†). Therefore, places themselves, as location techniques, provide a continuous theme that is picked up by the class through using reading, writing, and most importantly, speaking. Language: Students are able to express the location and nationality of their parents and grandparents using descriptors, along with simple prepositional phrases. Students will demonstrate mastery of differentiation of nation and nationality, and then relate these constructions to space and placement using autobiographical stories. Content: Content standards discussed above are met through repetition and regression of problem areas. The content covers a span of relatively basic exercises in the differentiation of cities and countries, along with nations and nationalities, as they are used in various prepositional phrases and relations, and moves on to consider more complex constructions such as the present perfect (â€Å"I have been here for†¦Ã¢â‚¬ ) (Getting, 1994). LEARNING STRATEGIES: In this lesson, visual learning is very important. Students learn to relate nations and nationalities through looking at maps and the representations of people through their placement in relation to space, time, and other objects.

Monday, July 22, 2019

Emperors Club Essay Example for Free

Emperors Club Essay English question 5 It is not living that is important, but living rightly and honestly. The definition of success varies depending on who is defining it. By the end of the novel, Hundert and Sedgewick Bell each believe that they have reached success in their own lives. Sedgewick, following in his Dad’s footsteps of using and manipulating every situation and opportunity in order to advance his selfish goals, feels successful as a wealthy and powerful businessman. Sedgewick by the example, set by his distant, judgmental, and uncompromising father has learned that being honorable and having good character are qualities that are unimportant when measuring a man’s success. Just like his father who did not see the merit of developing a moral conscience, Sedgewick Bell rejects the moral guidance of his caring teacher, choosing instead to cultivate the cut-throat tactics his father instilled in him as necessary to achieve the fame and fortune vital for success. In contrast, Hundert is only able to feel successful when he has regained his dignity and honor by confessing his breach of trust and asking for forgiveness from the student he betrayed. Once Hundert does the honorable thing and tells Blythe about Hundert’s cheating during the selection of the contestants for the Emperor’s Club competition, Hundert is able to reset his moral compass, and move on with his life. Hundert comes to understand that it was his selfish desire to see Bell succeed that drove Hundert to disregard what he knew was right in order to avoid the truth – that Sedgewick Bell had no desire to become the honest and hardworking student Hundert â€Å"willed† him to be. Through this realization Hundert is able to see that even though he may not have succeeded with Bell, this one â€Å"failure† does not minimize the positive contribution he has made to the lives of his many other students. Hundert’s success is evidenced by the fact that even after 25 years, Hundert’s students throw him a party to show their appreciation of the advice, instruction, interest and guidance he gave them when they were students at St. Benedict’s. Hundert is considered by the majority of his students to be a mentor, and positive role model. It is this realization that helps Hundert see that his success lies in the fact that his students have taken his message of living a moral, and honest life with them into their world and used his words to help shape their own productive lives . s well as, that of their children. Hundert realizes that success should be measured not by the money in a man’s pocket, or the job he has, but by the positive impact he has in the world and on the lives of others. As the film progresses Hundert comes to terms with the fact that no matter how hard he tried he could never compete with the powerful negative influences that were present in the Bell home. Sedgewick was raised to view a successful man as being self-serving, untrusting, insensitive, and controlling. It was when Humdert tried to set a new moral example of success for Sedgewick that Humbert was driven to compromise his own beliefs. Hundert learned that when one compromises him for the sake of another the relationship is doomed to fail. It is when Hundert is able to accept that he is not responsible for the selfish, immoral man Sedgewick has become that he can rid himself of the feelings of failure that resulted in him leaving the profession he loved. When Hundert is rewarded by the positive comments of his students he understands that his success is in the fact that he has made the world a better place because he has educated a generation of kind, caring and moral men and fathers who will pass on his appreciation of honor, dignity, kindness, sensitivity, creativity and integrity to future generations. Hundert and Sedgewick each define â€Å"success† differently and it is up to each individual viewer to watch and listen to the movie carefully in order to decide which definition he/she will use to evaluate the â€Å"success â€Å" of his/her life.

COMPUTERIZED SYSTEM Essay Example for Free

COMPUTERIZED SYSTEM Essay Systems techniques are tools used in the analysis, design, and documentation of system and subsystem relationships. They are largely graphical (pictorial) in nature.  Systems techniques are used by accountants who do systems work. Documentation includes the following types of tools: Narratives (written descriptions) Flowcharts Diagrams Other written material For this subject, we only need to discuss two (2) of the most common documentation tools: Data flow diagrams Graphical descriptions of the sources and destinations of data. They show: Where data comes from How it flows The processes performed on it Where it goes Include three types: Document flowcharts describe the flow of documents and information between departments or units. System flowcharts describe the relationship between inputs, processing, and outputs for a system. Program flowcharts describe the sequence of logical operations performed in a computer program DATA FLOW DIAGRAMS A data flow diagram (DFD) graphically describes the flow of data within an organization. It is used to: Document existing systems Plan and design new systems There is no black-and-white approach to developing a DFD. Data sources and destinations Appear as squares Represent organizations or individuals that send or receive data used or produced by the system An item can be both a source and a destination Data flows Appear as arrows Represent the flow of data between sources and destinations, processes, and data stores As you probably surmised(GUESS) from the previous slides, if a data flow is two-way, use a bi-directional arrow.If two data elements flow together, then the use of one data flow line is appropriate.

Sunday, July 21, 2019

The Office Depot ECommerce Systems Information Technology Essay

The Office Depot ECommerce Systems Information Technology Essay Office Depot Inc., founded in 1986, is one of the leaders in the office supplies industry with its head quarters in Boca Raton, Florida, USA. The Office Depots supplies include business machines, computers, softwares and office furniture whereas the services cover printing, copying, document reproduction, shipping and mailing. The customers to the company include individual customers, small office/home offices, and medium-/large-sized businesses. The sales are obtained through numerous channels which comprises of office supply stores, an outbound telephone account management sales force, internet sites, direct marketing catalogues and call centres. Office Depot Inc., deals to customers in 52 countries all around North America, Europe, Asia and Latin America. The company operates more than 40 separate websites in the International Division. While the word e-commerce refers to all the online transactions, B2C stands for business-to-consumer and goes for any business organization that sells its products or services to consumers on the Internet. The business model followed by Office Depot is B2C e-commerce model. The model provides both strategic and operational benefits to the company. The model helps in low order processing costs; brand recognition; improved customer service; market extension to locations where no office supplies store exists; reduces labour cost due to streamlined internal process; and improved information system integration. The company follows click-and-mortar kind of B2C model where the company allows customer to buy products and services online as well as they have physical stores located at various locations. The model tied the e-commerce frontend to the companys inventory and order management systems, and conducted real time inventory checks to ensure stock was available nearby. The model is build in customer centric e-commerce systems were intended to make customers so satisfied with their online shopping experience that they would not bother looking elsewhere on the Internet to save a few pennies. Customers were able to check warehouse inventory in real-time, place orders online, pay for orders online, and arrange for returns at a local store. 4. Customer Value Proposition The customer value proposition basically means the benefits which the vendor is providing to the customers in return to the amount charged for the specific products or services. The Office Depot assures a broad selection of quality office products and services. These products and services encompass the following characteristics: great quality, innovation, value and satisfaction guarantee. The major challenges that officedepot.com has tackled reasonably are simple to use, have an improved search capability, an expanded range of item availability, and they are meeting the expectations of customers with shipping quality and timely delivery. 5. Revenue Model The main goal of introducing B2C website is to bring down the cost or improve customer service, however, the primary aims remains to be generation of revenue and earn profit. The officedepot.com is the website providing products as well as services to its customers. This is the most common type of e-business model for generating revenue. In this model, the electronic catalogue is made available to the consumers; they can select the desired products or services from the catalogue and put it in the shopping cart. Then the payment received from the customer is the source of earning revenue. After the successful implementation of the B2C model, the total sales revenue of the firm has gone up considerably because of e-sales. With over $4.9 billion in e-Business sales during 2007, Office Depot is one of the largest online retailers in the world. They believe in offering customers the best choice of electronic trading solutions available, with different purchasing options according to their needs. The figure1 indicates the sudden rise in the sales after the implementation of the website and the continuous rise thereafter. 6. Marketplace Office Depot deals in the segment of office products and services. They are in competition to be the market leaders in the segment. The range of products office depot sells includes business machines, computers, softwares and office furniture whereas the services cover printing, copying, document reproduction, shipping and mailing. The growing prevalence of the internet access has enabled new markets to emerge online. To tackle with the market of consumers and businesses of all sizes the company is being segmented into three the retail division, the business solution division and the international division. Office Depot operates over 1,200 office supply stores in North America.   Internationally, the company operates another 400 retail stores in 48 countries.   7. Main Competitors The main competitors to Office Depot are Staples and Officemax. Together the three companies are the market leaders in the office industry. However, together they account for about only 10% of the total estimated $300 billion market. They rest of the market is divided widely between supermarkets, wholesale retailers and smaller independent companies. Office Depot stands second to Staples in the total sales and profits but had greater sales and higher operating margin in the international market than the leading competitor. Office Depot by the division of the retail and business solution sales in the international market is trying to take advantage in the international market by acquiring contract office suppliers around the globe in profitable markets such as Asia and South America. Staples: www.staples.com OfficeMax: www.officemax.com 8. Comparative Advantages The Office Depot was the first to introduce the concept of shopping, ordering and managing shipments online for the office products and services segment. Office understands the nature, reasons, needs and concerns of customer by realizing that all the customers are not the same level. Every other customer has different wants and needs. The company has added the brick-and-mortar catalogue on their website and thus have successfully increased choices, selection and searching capabilities. Officedepot.com provides lower prices by discount offers, auctions and promotional prices. Special discounts are given to the schools. The product descriptions are clear and concise, and usually have measurements included, sometimes in graphical format as well. Officedepot.com has the advantage of belonging to a well established distribution infrastructure that can handle peak demand. It also has an established brand with a good and trustworthy image, large customer base, expertise and facilities to serve customers with catalogue sales, and has stores for handling product returns. Bricks-and-clicks retailers enjoy significant advantages over Internet pure-plays including lower customer acquisition and smaller marketing-related outlays. Officedepot.com website is designed with proper attention and it is capturing, dynamic, changing, offering new things and promotions, user friendly, not crowded or overwhelming, efficient and easy for navigation, just in time information for out of stock items, and easy to read text. 9. Market Strategy Office Depot targets consumers and businesses of all sizes. They range from individual customers to the small offices/home offices to the large offices and organizations. The main strategy is to provide maximum possible options combined with special discount offers. The basic market strategy followed by the officedepot.com to keep the customers intact and at the same time providing satisfaction is: Intelligent Search Facilities an amazingly easy way to locate the correct product every time Bulletin Board an effective online communication tool to reach all end users with important information User set-up and Management Office Depot Online is a self service solution putting our customers in the driving seat Controls tailored approval processes and budgeting are available to help you to manage your business Multiple Shopping lists list all your favourite items in one place to create your orders with 10. Conclusion Officedepot.com is one of the finest examples of the business-to-customer e-commerce model. The officedepot.com was introduced by Office Depot in order to meet the increasing requirements with the rapid growth of the Internet. The website officedepot.com is a click and mortar kind with inclusion of brick and mortar catalogue and thus increasing the options available to select from. The revenue generated is simply through the selling of the products. Officedepot.com does face stiff competition but with the kind of infrastructure and service it is being able to attract customers to itself. 11. References http://www.officedepot.com/ http://en.wikipedia.org/wiki/Customer_value_proposition http://www.living2xcess.com/2010/06/office-depot-strategic-analysis_01.html http://www.slideshare.net/socialcoop/ebusiness-models http://www.buzzle.com/articles/b2c-marketing-a-guide-to-business-to-consumer-marketing.html

Saturday, July 20, 2019

Karl Marx and the Ideal Society Essay -- capital communism freedom wor

Karl Marx and the Ideal Society One of the greatest debates of all time has been regarding the issue of the freedom of mankind. The one determining factor, for Marx, it that freedom is linked with class conflict. As a historian, Karl Marx traced the history of mankind by the ways in which the economy operated and the role of classes within the economy. For Marx, the biggest question that needed to be answered was â€Å"Who owns freedom?† With this in mind, Marx gives us a solution to both the issues of freedom and class conflict in his critique of capitalism and theory of communism, which is the ideal society for Marx. His theory of communism is based on the â€Å"ultimate end of human history† because there will be freedom for all humankind. Marx saw communism as the ideal society because it is "the genuine resolution of the conflict between man and man- the true resolution of the strife between existence and essence...between freedom and necessity" that capitalism fosters. Marx was also committed t o the notion that theory and action go hand in hand. Marx dismissed earlier thinkers because they (philosophers) "have only interpreted the world in various ways; the point, however, is to change it." He also stated "Ideas cannot carry out anything at all. In order to carry out ideas men are needed who can exert practical force". However, Marx would have been appalled by the way his theory of communism was misused. It can be said, though, that Marx's theory of communism was clearly open for interpretation because he failed to offer "principles or guidelines of even the most general kind" for how the system of communism was to be fully established. It was this opportunity for interpretation that made Marx's theory of communism doomed for failure when it was used in practice.   Ã‚  Ã‚  Ã‚  Ã‚  Marx’s theory stems from the social conditions existing during his lifetime. This was when the industrial revolution was hitting its stride. Great technological advances were being made to the modes of production, especially in the areas of agriculture and textiles. This was the main factor that drove peasants from the countryside to find work in the cities. In addition, capitalism had emerged as the dominant form of economics. Marx contended that class is based upon the economic conditions of society. He identified class through the history of the changing modes of production. In a capital... ...leads to change. Marx certainly believed and documented this and based his theory of communism upon it. However, the gaps left in his theory have resulted in varying interpretation to what he originally envisioned. A society without class or state may very well have been achieved if his theory had given more direction as to the details for its establishment. Instead, Marx's theory has been twisted and rewritten to suit the interests of others. Perhaps the greatest problem with his theory "is that no one has tried it". Bibliography Bakunin: The Philosophy of Freedom, Brian Morris, Black Rose Books, 1993. Marxism and Class Theory, Frank Parkin, Columbia University Press, 1979. Marx: A Clear Guide, Edward Reiss, Pluto Press, 1997. Revolution and Counter-revolution in Germany, Frederick Engels, Foreign Languages Press, 1977. Capital, Karl Marx, Progress Publishers, 1971. German Ideology, Karl Marx and Frederick Engels, International Publishers, 1996. European Democracies, Jurg Steiner, Addison-Wesley Educational Publishers Inc., 1998. The Outlook: Worker-Capitalists of the World Unite, Jacob M. Schlesinger, The Wall Street Journal, Monday, November 15,1999.

Friday, July 19, 2019

Facing Death Essay -- Papers Death Dying Life Religion Essays

Facing Death Works Cited Not Included In today?s modern society we have a certain distaste for the subject of death. There are people in society feel uncomfortable with the subject of death. The subject of death is a reality that we need to face everyday. There is nothing any of us can do about death, and there is no virtue in dwelling on it or trying to penetrate its mystery. Is it possible to prepare for death? In our day and age as we know it, there have been astounding advancements in medicine. The average life expectancy has risen. People are being educated in issues that surround a healthy life style. As a society, we are trying to increase our life span and defeat death. While people are following strict diets and grueling exercise programs, the earth is creating new diseases, viruses, bacteria, and illnesses that cause death. Is the earth compensating for these new medical advancements by creating these deadly ailments to make life and death equal? We are all going to die; that?s not our problem. Our problem is how to live until we die. Our ...

What’s Under my Bed :: Free Essay Writer

What’s Under my Bed As I cleaned and rearranged my room one day, I slid my bed forward and found my childhood teddy bear. When I first saw him I could not believe I still had him. It looked much different than I remember. It was covered in dirt and grime. It smelled like a dusty, mildew-infested basement. I remembered the bear’s name; his name was Horace. I named him after myself. Horace lay there on my floor; his body stretched out twenty-four inches across my floor. He is wearing my old blue denim Oshkosh overalls. The overalls’ appearance reminds me of pants that had been run through the washer several hundred times. Atop Horace’s head are two half brown, half mocha, orange slice shaped ears. The right ear has an inch slit where a sliver of white thread hangs out. He has a large orange-peach head like a scrap of metal going through the first stages of oxidation. The soft fur on his head is hard and matted on the end where sticky candy used to lie. He has one small half marble, black eye on the right side. On the left side he has a hole where fluffy dirt colored cotton hangs out. The left side also has a dark brown spot; the spot reminds me of a cartoon character with a black eye. Just under the left eye on his puffy, beige-colored cheek he has two dark brown freckles. In between his right eye, and left hole, he has a patch of hair missing, wh ich reveals tightly threaded fish netting holding the stuffing inside. An inch below that is his flat, oval shaped nose. I can see teeth marks made by a teething Child. Horace’s head attaches directly to his torso; there is no neck in between. There is an upside down beige triangle patch of fur top of his chest his chest. His upper body is dark brown, like the patch around his eye. The brown flows out to the outstretched, five-inch arms. It comes to an end at the last two inches of the arms where it changes to an orange-peach color again. His lower section is hidden in the overalls. The left leg of the overalls is cuffed just above the foot.

Thursday, July 18, 2019

Dbq on the Medical Field During the 18th Century Essay

The medical field during the eighteenth century was comprised of unsanitary, heinous, and uncustomary practices, such as blood letting, trepanation, and the overcrowding of hospitals. Even though these practices didn’t help in the development of the medical field, there were auspicious practices that were beneficial, such as midwifery, ingrafting, and faith in God. Midwifery, during the 1700’s, was one of the most womanized practices of the century. To get the help of a male midwife was a belittlement to the female midwife and it was also a way of disparaging midwifery (Document 2). Also, midwives were expected to obtain the knowledge of caring for and to the skills for the well-being of women in labor(Document 2). While the conditions of a woman giving birth improved dramatically, so did the reputation of midwifery. Ingrafting was one of the most cogent inventions in medicine in the eighteenth century. Diseases as contagious and fatal as the smallpox were almost eliminated with the invention of ingrafting (Document 3). This procedure was so advantageous that Lady Montagu, an English writer, was â€Å"well satisfied of the safety of the experiment,† that she intended to try it on her own son (Document 3). Ingrafting has also evolved into vaccines that now can cure and treat malignant ailments like the flu and cowpox. Faith in God was a way for people to have mental support for their ailments, even though it didn’t cure or treat any ailment, people still turned to God for aspiration. Many people still believe in the power of prayer and in the power of faith to relieve them of illnesses. This is best stated by William Buchan, an Edinburgh physician, because his statement that the Christian religion teach that, â€Å"the sufferings of this life are designed to prepare us for a future state of happiness. †(Document 7) Medical practices, such as midwifery, ingrafting, and faith in God, of the eighteenth century not only advanced to the benefit of the overall health of the people, but also led to the more advanced practices used today. Although these practices were basic, they are the vital parts of the development of medicine.

Wednesday, July 17, 2019

Juno film Essay

JunoThe motion limn I have chosen for this paper is the drama- drollery Juno say by Jason Reirman. It is a domestic help funniness with anarchic elements. In the conduct, you charter to line Juno MacGuff, a 16-years-old lady friend, as her liveness changes when she finds extinct that she is pregnant. Its a realistic characterisation told from Junos point of view. The film touches some(prenominal) contr every(prenominal)placesial, populist themes, but manages to do so with step to the fore be clich. The culminationly obvious being the boyish pregnancy, but separate topics oft(prenominal) as the curiosity of sex among teenagers, the unalterable questioning of whether abortion is okay or not comes a con boldnessrable with it. A queen-size part of the film takes place in Junos home, which is typical for a domestic comedy. The principal(prenominal) plot of the movie touches themes leafy vegetable to family life. on that point is the modern family core with stepm differents and half-siblings, the complicity in being a teenager as well as raising wholeness. The much or less ordinary family life is dis spelled with a lot of humor. The questioning of stereotypes and prejudices play a better-looking role in this film, as do contrasts. Instead of the cheerleader get pregnant with the quarter certify, as many would expect, it is the hoyden and the geeky runner who end up in that goernment agency. As most teens portrayed in films, Juno has a close girlfriend. The odd function in this case is that it is not a girl conside cerise stranger than Juno herself in legal injury of norms, it is the cheerleader. In many other of these teen films, usually the cheerleader bugs the odd girl, as for pil broken incase in Mean Girls. The most prominent contrast in the film is the home of the MacGuffs VS. the home of the adoptive p atomic number 18nts ascertain and genus Vanessa Loring. The both homes atomic number 18 nonplus same(p) two different wor lds. In the MacGuff house, it searchs like it is impossible to have withal many lamps, ornamental pursues or characterisation frames.The coloring scale goes in gross br experience tones. Mean plot, the Loring house does not seem to ever be perfect enough. As Vanessa and Mark be introduced to the story, Vanessa is putting the photo frames in sound out and arranging the flowers until they argon perfect. The dominant colors in the Loring house are blanched bright colors as beige and white. The houses become symbolisations for how different the two families are. The easy dismissal, mussy MacGuffs, and the up preposterous, stiff Lorings. For the opening scene of the film, at that place is a long cam stroke of Juno rest in front of an armc pilus. The armchair is going to be a symbol throughout the movie. The television photographic camera misfortunes to a close up of Junos wait and her empty-bellied eyes staring at the chair, delivering amessage of frustration and hopele ssness.She has a monolog where she puts the viewer about the chair, that it was in a chair everything started, where she got pregnant. A film at heart the film of Junos memories from that moment is fork upn for the viewer. A dog barks and the camera addles a quick cut back to verity, Juno and the chair. She leaves the chair behind and the camera follows her as she goes to the local corner sponsor to get a pregnancy screen out, the ternion for the day. She is dressed in a release jacket crown and blue jeans, the red symbolizes her strong, vivid personality. Red is also a symbol for life and vitality, a color symbolism very suitable for the scene. She takes the pregnancy test in the stores assign restroom, which has a dim low-key lessenning. The mount reinforces the belief of Juno being painted into a corner. As she takes the test, the camera cuts among close-ups of Junos legs as she sits down, the pregnancy test and her face. These close-ups make the relationship ami dst Juno and the viewer advert and one gets to feel sympathy for her. It is strategic to anchor the sympathy for Juno in the set about of the film since the viewer will get to follow her during her journey. Juno leaves the store and walks home, the camera follows her from behind. vestige has fallen and Juno has put the hood everyplace her head as a instruction to alienate herself from the surrounding world. As she walks, a group of guys from her school comes running towards her.They are out of focus and run by her on both sides, creating like a tunnel for Juno to walk through. To me the runners are a metaphor for the thoughts running through Junos head and the difficult repressed situation in which she has ended up. Juno is portrayed as a stubborn, cocky girl who takes her own sort in life. She has dark hair that she wears in a ponytail and her clothes are far from what typi bring upy are considered girl clothes. She wears loose fitted jeans, t-shirts, pul lie withrs and hood s. Her best friend, Leah, on the other hand is a cheerleader with long blond hair who dresses in skirts and is much of a girly-girl. As the Leah is introduced to the audience, the contrasting personalities between the two friends are shown trough the mise-en-scene. When Juno calls Leah to severalise her about the pregnancy, the camera cuts between the two girls and their bedrooms. Junos room has a shoebox feeling to it. There are photos of her friends, posters and different paintings all over the walls as well as the hood. She has plectrums move all over her desk and a elucidation electric guitar that destines away her interest for music. The prevail colors are earthy tones of brownish, red and orange.Leahs room on the other hand is dominated by light colors such as pink, white, colour and dim blue. She has stuffed animals on a ledge and big windows with thin, light curtains. Juno decides that the way to tell the frys father, Bleeker, about the pregnancy is to set up a bris k room setting in his cat valium where she can break the reinvigorateds. When darkness falls, Leah is helping to move everything that is needed. They help apiece other to lift a heavy armchair into the bole of Junos car. In this scene, the armchair is a symbol for the pregnancy, something that all the girls k flat of so far. It is still a complex, heavy secret kept in the dark, moreover like the chair. Reirman uses color value in a broad way through the film, especially when it comes to the characters clothes. In the consignment of the armchair scene, Juno wears a red hood while Leah wears a blue. This highlights the different personalities of the two young girls even more. As the pregnancy progresses the color of Junos clothes changes from the bright red hood to earthier, duller colors in green and brown shades.This color change reinforces Junos situation and the final result the pregnancy has on her life. Another example of color value being utilize is when Vanessa gets to see her son for the prototypic time. She is whence wearing a yellow sweater, symbolizing the joy she feels after at last becoming a mother. A depute she feels she has been born to. During a visit to the prospective adoptive parents Juno finds out that Mark is going to divorce Vanessa, sad and frustrated she heads back home. The camera is shooting from the backseat as Juno is driveway she is placed to the left of the frame and the long, empty road ahead of her to the right. This creates a faeces from left to right, expectant the viewer a feeling of optimism and that everything will work out for the best. The camera cuts to a panning shot as Juno parks the car by the side of the road. A cut to a low angle is do, showing a close up of Juno as she cries. The gray seat, ceiling and the steering wheel creates a tight frame around Juno.There is a claustrophobic feeling through the setting, which emphasizes the imperfect state Juno finds herself in. Juno decides that if Vanessa is still impulsive to be a mom, Juno is willing to give her the baby. The majority of the film is shot in high key lightning, typical for comedy movies. This goes for the scene at the hospital when the baby is born as well. However, in the following(a) scene this will change. The camera shows aclose up of Mr. MacGuff as he pats the head of his daughter who just gave birth. The lightning has gotten softer, giving the yellow color of the walls a cordially soothing glow. There is calm and a balance over the scene, giving the feeling that everything is going to be okay from now on. The camera then cuts to a shot from Junos point of view showing Bleeker stand up in the door opening. The walls behind Bleeker are blue and contrasting to the goldish colors in Junos hospital room.The colors and the separating walls become a metaphor for the cold reality Bleeker is just coming from, and the warm future that he is about to step into with Juno. A reality more suitable for two 16-year-old ki ds, where they do not have to be parents. Juno is a realistic film anchored in reality, there are several references to modern husbandry to underline this. Films and hobbits are mentioned, but the main thing is the music. Music is a big part of Junos life and her personality. It also becomes a key element when Juno and Mark are bounding. They burn CDs to each other and discuss music by Sonic Youth, Iggy Pop and Patti Smith among others. To commence that the film is told from Junos point of view, Reirman uses her congressman over as rapid cuts are made of what she is talking about. This technique is employ when Juno introduces her family. As she talks about her mother, who is living in Arizona, the camera cuts to long shot of a desert house in the affectionateness of a beige field. The tone of Junos voice says that the mothers absence seizure does not bother her that much, as to the bluntness of the colors in the shot.The camera then cuts to extreme close-ups of the smiles of h er mothers new family, the husband and their three replacement kids. To show the viewer that the mother has been out of the picture for a long time the camera cuts to a close up of many cactuses in a window. Junos voice over is explaining that her mother sends her one cactus every valentines day. In Juno, the mise-en-scene is frequently used to strengthen the message of the film. By utilize color values, lightning keys and symbolism Reirman captures the contrasts of the story. I do not know if I would call Juno my favorite film, but it is definitely one of my favorite feel-good films. No matter what mood I am in, I constantly feel much happier and more confirmative after watching this film. I love the sarcasm in the film and I can see much of myself when I was 16 in Juno. I like how the film takes up such a controversial and taboo topic with as much humor as it does. To me it makes the film appealing instead offeeling as a moral message to teenagers.